When reviewing an organization’s logical access security, which of the following should be of MOST concern to an IS auditor?
To determine who has been given permission to use a particular system resource, an IS auditor should review:
To determine who has been given permission to use a particular system resource, an IS auditor should review: